Re: [pkix] [smime] Key lookup service via draft-bhjl-x509-srv-00

"Miller, Timothy J." <tmiller@mitre.org> Thu, 24 March 2016 19:59 UTC

Return-Path: <tmiller@mitre.org>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 839B612D826; Thu, 24 Mar 2016 12:59:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level:
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mitre.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y11x8ZfXr41J; Thu, 24 Mar 2016 12:59:16 -0700 (PDT)
Received: from smtpvmsrv1.mitre.org (smtpvmsrv1.mitre.org [192.52.194.136]) by ietfa.amsl.com (Postfix) with ESMTP id 67C9312D807; Thu, 24 Mar 2016 12:59:16 -0700 (PDT)
Received: from smtpvmsrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 0A39CABC0A7; Thu, 24 Mar 2016 15:59:16 -0400 (EDT)
Received: from imshyb02.MITRE.ORG (imshyb02.mitre.org [129.83.29.3]) by smtpvmsrv1.mitre.org (Postfix) with ESMTP id EC2556C075C; Thu, 24 Mar 2016 15:59:15 -0400 (EDT)
Received: from imshyb01.MITRE.ORG (129.83.29.2) by imshyb02.MITRE.ORG (129.83.29.3) with Microsoft SMTP Server (TLS) id 15.0.1130.7; Thu, 24 Mar 2016 15:59:15 -0400
Received: from gcc01-dm2-obe.outbound.protection.outlook.com (10.140.19.249) by imshyb01.MITRE.ORG (129.83.29.2) with Microsoft SMTP Server (TLS) id 15.0.1130.7 via Frontend Transport; Thu, 24 Mar 2016 15:59:15 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitre.onmicrosoft.com; s=selector1-mitre-org; h=From:To:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=VyBvTWWEOe8vpWzFUe7gIstWAbLrIx96Hyb1xvpzX2M=; b=wWY+U38J0UATIZl4cX6bDdpzj3LJPelgwQ0yz5DhRvAH/Hkt3NRt3SmhFDREpjgmJC8Ft4WQO7jI69jjg64IE6Pv1XM44apD68HvLLZvckRyreDpbpMGIAi46RViYAgPkIbkRnt/KhasAMLtbvxaiEfSmDhvyn5W6M192MqrzBI=
Received: from BY1PR09MB0920.namprd09.prod.outlook.com (10.162.144.157) by BY1PR09MB0919.namprd09.prod.outlook.com (10.162.144.156) with Microsoft SMTP Server (TLS) id 15.1.434.16; Thu, 24 Mar 2016 19:59:14 +0000
Received: from BY1PR09MB0920.namprd09.prod.outlook.com ([10.162.144.157]) by BY1PR09MB0920.namprd09.prod.outlook.com ([10.162.144.157]) with mapi id 15.01.0434.019; Thu, 24 Mar 2016 19:59:14 +0000
From: "Miller, Timothy J." <tmiller@mitre.org>
To: John R Levine <johnl@taugh.com>
Thread-Topic: [smime] Key lookup service via draft-bhjl-x509-srv-00
Thread-Index: AQHRhTGmh22EPby4TE+kk5RKeaJMBp9nWoUA///EeQCAAGy0AIAA+HcQgAAwjICAACNwUIAAEeUAgAARZVA=
Date: Thu, 24 Mar 2016 19:59:14 +0000
Message-ID: <BY1PR09MB0920F6BA9319D12BF6EF3771AE820@BY1PR09MB0920.namprd09.prod.outlook.com>
References: <CAAFsWK3HEXDgqONxBohBCGMKk2qMa230fxcNEaGhoTwQZVYQoQ@mail.gmail.com> <alpine.OSX.2.11.1603221443230.18473@ary.lan> <CAAFsWK2Xbw0eU2oz4edtmPH5PhwJgQkTYWKhFruZnCnD37c_CQ@mail.gmail.com> <alpine.OSX.2.11.1603231431110.4624@ary.lan> <FB501B0B-999D-45E4-A739-4D561A25275B@mitre.org> <CAAFsWK1p-_HNYwM1B-p8MMo58u2hURW45ytKr_1f3h+XKDS5wA@mail.gmail.com> <BY1PR09MB09201BC92CD9FD1E76703D7FAE820@BY1PR09MB0920.namprd09.prod.outlook.com> <alpine.OSX.2.11.1603241107510.9761@ary.lan> <BY1PR09MB0920D9D77D591080E5929631AE820@BY1PR09MB0920.namprd09.prod.outlook.com> <alpine.OSX.2.11.1603241357170.10758@ary.lan>
In-Reply-To: <alpine.OSX.2.11.1603241357170.10758@ary.lan>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: taugh.com; dkim=none (message not signed) header.d=none;taugh.com; dmarc=none action=none header.from=mitre.org;
x-originating-ip: [192.160.51.86]
x-ms-office365-filtering-correlation-id: 08e0c529-f3c0-4149-52cc-08d3541ec692
x-microsoft-exchange-diagnostics: 1; BY1PR09MB0919; 5:UaT0XRrRhUGaPgBbiovsHWhuOr/CekTNYkQYo+0DHrARCQcmW3JP7Qu828WC6ua5BUL8QzIXVrU3FPriAyc1WTUOLru23rRMM8C6Y1Tlw8tVJqJDHtIr6QBsV/KXum7g/6BPLFzrLsovPcenAWQuTg==; 24:vXH5USexZVPqkvcVAGXOBCvSF5pXf6ImOQSbOKeq2xZJYOwwQvUaYHEnczSEiwaxzDKx7z0+isIAwxzOdbXlztn8EaULrsdgKZeDRU3+fzI=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BY1PR09MB0919;
x-microsoft-antispam-prvs: <BY1PR09MB09197EDD9B32A111E373B7C3AE820@BY1PR09MB0919.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001); SRVR:BY1PR09MB0919; BCL:0; PCL:0; RULEID:; SRVR:BY1PR09MB0919;
x-forefront-prvs: 0891BC3F3D
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(3660700001)(122556002)(74316001)(86362001)(5004730100002)(5002640100001)(3280700002)(2906002)(11100500001)(4326007)(345774005)(5003600100002)(99286002)(2950100001)(106116001)(1096002)(5008740100001)(93886004)(2900100001)(5890100001)(92566002)(33656002)(586003)(1220700001)(76176999)(77096005)(3846002)(102836003)(54356999)(87936001)(50986999)(10400500002)(6116002)(110136002)(76576001)(66066001)(230783001)(189998001); DIR:OUT; SFP:1101; SCL:1; SRVR:BY1PR09MB0919; H:BY1PR09MB0920.namprd09.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Mar 2016 19:59:14.5352 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: c620dc48-1d50-4952-8b39-df4d54d74d82
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY1PR09MB0919
X-OriginatorOrg: mitre.org
Archived-At: <http://mailarchive.ietf.org/arch/msg/pkix/pIbaVrwEsRtXOsEd8ubzZu6nC3U>
Cc: PKIX <pkix@ietf.org>, IETF SMIME <smime@ietf.org>
Subject: Re: [pkix] [smime] Key lookup service via draft-bhjl-x509-srv-00
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pkix/>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2016 19:59:18 -0000

> I'm sorry, this makes no sense.  How is my MUA supposed to know about the
> key of someone from whom I have not yet received a message?  Based on
> the arguments I've seen, the main point of a key lookup service is to enable
> opportunistic encryption on the first message.

My MUA knows my key.  Your MUA knows your key.  All that's missing is a way to have my MUA talk to yours.  

Practically speaking, S/MIME MUAs already do this using the quintessential exchange of signed messages and automatic collection of certs when caching contact data.  However, this was never formalized into something that MUAs could actively provide; rather, it was left as a passive function.  GETSMIME was an attempt to make this active. 

> Also, your assertion that the cert repository is likely to be stale makes a
> bunch of assumptions that were reasonable in the 1990s but not now.
> For example, vast numbers of people primarily use web mail, so the MTA and
> MUA are the same, they're both attached to the web server, so the
> repository sees the same certs the users do. 

I'm hesitant to enable something as incredibly...naïve...as would give a convenient private key store for {insert your favorite Evil Agency here} to target to further their surveillance goals.  I take BCP 188 seriously, and the best way to address that threat model is to preserve the end-to-end guarantees of S/MIME.  You want S/MIME in webmail?  We need Web Crypto implemented in browsers.

Once you have Web Crypto, the private key store and the service provider are separate again, and the repository goes stale.

Also, since webmail service providers all allow fat clients (mobile mail apps are fat clients using a web API and are not fundamentally different from using a traditional mail client over POP3/IMAP4), in many (most?) use cases the client's key store is still separate from the provider, so the provider's repository still can and will go stale.

> And in domains that are authorities for their users, e.g., businesses that
> provide accounts to their employees, the domain's repository is accurate by
> definition, 

Bzzt.   Incorrect, but thank you for playing.   :)

Building and maintaining an enterprise PKI directory is actually very complex, not fully automatable, and is a right royal PITA.  For example, Outlook wants userSMIMECertificate and will ignore userCertificate in most cases, because userSMIMECertificate is a PKCS#7 object and contains the user's encryption capabilities.  However, you can't automatically generate the PKCS#7 object since it's signed and requires a user action.  So even if you have your CA publishing directly to AD, it's publishing userCert, and you have to *train your users* to drill down into Trust Center (3 to 4 clicks), re-set the S/MIME profile, and Publish to GAL *every time they get a new cert*.

Good luck with that.  :)

> and there's an argument that repository checks can detect some
> kinds of mail forgery.

An MUA using key continuity concepts can do this too.

-- T